Facilitating and securing offline e-medicine service through image steganography
- Author(s): A.H.M. Kamal 1, 2 and M. Mahfuzul Islam 2
-
-
View affiliations
-
Affiliations:
1:
Department of Computer Science and Engineering, Jatiya Kabi Kazi Nazrul Islam University, Mymensingh, Bangladesh;
2: Department of Computer Science and Engineering, Bangladesh University of Engineering and Technology, Bangladesh
-
Affiliations:
1:
Department of Computer Science and Engineering, Jatiya Kabi Kazi Nazrul Islam University, Mymensingh, Bangladesh;
- Source:
Volume 1, Issue 2,
June 2014,
p.
74 – 79
DOI: 10.1049/htl.2013.0026 , Online ISSN 2053-3713
- « Previous Article
- Table of contents
- Next Article »
E-medicine is a process to provide health care services to people using the Internet or any networking technology. In this Letter, a new idea is proposed to model the physical structure of the e-medicine system to better provide offline health care services. Smart cards are used to authenticate the user singly. A very unique technique is also suggested to verify the card owner's identity and to embed secret data to the card while providing patients' reports either at booths or at the e-medicine server system. The simulation results of card authentication and embedding procedure justify the proposed implementation.
Inspec keywords: steganography; biomedical communication; smart cards; security of data; health care; medical image processing; electronic health records; image coding; access control; information networks; cryptographic protocols
Other keywords: card authentication; offline health care services; offline e-medicine service facilitation; Internet; networking technology; e-medicine booths; data embedding procedure; single user authentication; smart cards; e-medicine server system; offline e-medicine service security; image steganography; card owner identity verification; e-medicine system physical structure; patient reports
Subjects: Biomedical measurement and imaging; Cryptography theory; Optical, image and video signal processing; Protocols; Medical administration; Medical and biomedical uses of fields, radiations, and radioactivity; health physics; Computer communications; Computer vision and image processing techniques; Information networks; Biomedical communication; Patient diagnostic methods and instrumentation; Cryptography; Data security; Biology and medical computing
References
-
-
1)
-
22. Hong, W., Chen, T.-S.: ‘A local variance-controlled reversible data hiding method using prediction and histogram-shifting’, J. Syst. Softw., 2010, 83.12, pp. 2653–2663 (doi: 10.1016/j.jss.2010.08.047).
-
-
2)
-
11. Liou, Y.P., Lin, J., Wang, S.S.: ‘A new dynamic ID-based remote user authentication scheme using smart cards’. Proc. of 16th Information Security Conf. 2006, Taiwan, pp. 198–205.
-
-
3)
-
23. Lin, C.-C.: ‘An information hiding scheme with minimal image distortion’, Comput. Stand. Interfaces, 2011, 33, (5), pp. 477–484 (doi: 10.1016/j.csi.2011.02.003).
-
-
4)
- C.-F. Lee , H.-L. Chen . A novel data hiding scheme based on modulus function. J. Syst. Softw. , 5 , 832 - 843
-
5)
-
14. Pang, L., Sun, M.-H., Luo, S.-S., et al: ‘Full privacy preserving electronic voting scheme’, J. China Univ. Posts Telecommun., 2012, 19, (4), pp. 86–93 (doi: 10.1016/S1005-8885(11)60287-2).
-
-
6)
-
13. Khan, M.K., Kim, S.K., Alghathbar, K.: ‘Cryptanalysis and security enhancement of a more efficient & secure dynamic ID-based remote user authentication scheme’, Comput. Commun., 2011, 34, pp. 305–9 (doi: 10.1016/j.comcom.2010.02.011).
-
-
7)
-
9. Liao, I., Lee, C.C., Hwang, M.S.: ‘Security enhancement for a dynamic ID-based remote user authentication scheme’. Proc. of the Int. Conf. on Next Generation Web Services Practices (NWeSP‘05), Seoul Korea, 2005, pp. 437–40.
-
-
8)
-
1. Chen, C.-C., Tsai, Y.-H.: ‘Adaptive reversible image watermarking scheme’, J. Syst. Softw., 2011, 84, (3), pp. 428–434 (doi: 10.1016/j.jss.2010.11.891).
-
-
9)
-
20. Zhao, H., Wang, H., Khan, M.K.: ‘Statistical analysis of several reversible data hiding algorithms’. Proc. Multimedia Tools and Applications, 2009, DOI: 10.1007/s11042-009-0380-y.
-
-
10)
-
6. Ulutas, M., Ulutas, G., Nabiyev, V.V.: ‘Medical image security and EPR hiding using Shamir's secret sharing scheme’, J. Syst. Softw., 2011, 84, (3), pp. 341–353 (doi: 10.1016/j.jss.2010.11.928).
-
-
11)
-
15. Rura, L., Issac, B., Haldar, M.K.: ‘Secure electronic voting system based on image steganography’. 2011 IEEE Conf. on Open Systems (ICOS 2011), 2011.
-
-
12)
-
28. Hong, W., Chen, T.S.: ‘A novel data embedding method using adaptive pixel pair matching’, IEEE Trans. Inf. Forensics Sec., 2012, 7, (1), pp. 176–184 (doi: 10.1109/TIFS.2011.2155062).
-
-
13)
- L. Kamstra , H.J.A.M. Heijmans . Reversible data embedding into images using wavelet techniques and sorting. IEEE Trans. Image Process. , 12 , 2082 - 2090
-
14)
- C.-L. Liu , S.-R. Liao . High-performance JPEG steganography using complementary embedding strategy. Pattern Recog. , 2945 - 2955
-
15)
-
19. Huang, F., Luo, W., Huang, J.: ‘Steganalysis of JPEG steganography with complementary embedding strategy’, IET Inf. Secur., 2011, 5, (1), pp. 10–18 (doi: 10.1049/iet-ifs.2009.0080).
-
-
16)
-
7. Brindha, S., Vennila, I.: ‘Hiding fingerprint in face using scattered LSB embedding steganographic technique for smart card based authentication system’, Int. J. Comput. Appl., 2011, 26, (10), pp. 51–55.
-
-
17)
- E.-J. Yoon , E.-K. Ryu , K.-Y. Yoo . An improvement of Hwang-Lee-Tang's simple remote user authentication scheme. Comput. Secur. , 1 , 50 - 56
-
18)
- N. Provos , P. Honeyman . Hide and seek: an introduction to steganography. IEEE Secur. Priv. , 3 , 32 - 44
-
19)
-
18. Yang, C.-H., Weng, C.-Y., Wang, S.-J., Sun, H.-M.: ‘Varied PVD + LSB evading detection programs to spatial domain in data embedding systems’, J. Syst. Softw., 2010, 83, (10), pp. 1635–1643 (doi: 10.1016/j.jss.2010.03.081).
-
-
20)
-
12. Wang, Y.Y., Kiu, J.Y., Xiao, F.X., Dan, J.: ‘A more efficient and secure dynamic ID based remote user authentication scheme’, Comput. Commun., 2009, 32, (4), pp. 583–5 (doi: 10.1016/j.comcom.2008.11.008).
-
-
21)
- A.K. Das . Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Inf. Secur. , 3 , 145 - 151
-
22)
-
17. Hong, W., Chen, T.-S., Luo, C.-W.: ‘Data embedding using pixel value differencing and diamond encoding with multiple-base notational system’, J. Syst. Softw., 2012, 85, (5), pp. 1166–1175 (doi: 10.1016/j.jss.2011.12.045).
-
-
23)
-
5. Tian, H., Zhou, K., Hong, J., et al: ‘An M-sequence based steganography model for voice over IP’. IEEE Int. Conf. on Communications (ICC 2009), 2009.
-
-
1)